Transcription

1 Factors Influencing the Adoption of Biometric Authentication in Mobile Government Security Thamer Omar Alhussain Bachelor of Computing, Master of ICT School of Information and Communication Technology Science, Environment, Engineering and Technology Group Griffith University Submitted in fulfilment of the requirements of the degree of Doctor of Philosophy June 2011

2 Abstract ABSTRACT This dissertation presents a new substantive theory that identifies and describes the factors that influence the adoption of biometrics in the security of m-government applications. The developed theory is specific to a particular context and area of the application of biometric authentication into mobile devices for government services in the Kingdom of Saudi Arabia (KSA). Given the continuing growth of mobile phone and Internet services, this dissertation is significant since it adds to current knowledge on how biometric authentication can play an integral role in providing secure m- government services. More specifically, this dissertation provides rich insight into understanding the adoption factors based on the concerns and perceptions of users, service providers, and network operators regarding the application of biometric authentication to mobile devices for government services. This dissertation is theoretically significant, because while the weakness of the current authentication method in mobile devices introduces additional demands to ensure that advanced authentication methods are used, no known research exists on the adoption of biometric authentication in mobile devices for government services, especially in Saudi Arabia. This dissertation addresses the gap in the literature by presenting an empirical study based on an analysis of the concerns and perceptions of mobile communication users, service providers, and mobile network operators regarding the application of biometric authentication to mobile devices for m-government services in Saudi Arabia. The research presented in this dissertation is based on the interpretivist paradigm of research which assumes that people generate their own subjective and intersubjective meanings about the world as they socially interact with the world around them. This interpretivist paradigm of research is carried out by the use of grounded theory methodology. Data collection processes include a questionnaire and semi-structured interviews. In particular, eleven face-to-face semi-structured interviews were conducted with the managers of online services and the IT security managers of mobile e-government service providers. Four semi-structured interviews were also conducted with managers and IT security providers in mobile communication network services. In addition, a survey questionnaire was distributed to mobile communication Page i

3 Abstract users in order to collect larger amounts of data on the users concerns and perceptions in a shorter time scale than would have been possible with interviewing mobile phone users. A total of 311 questionnaires with a response rate of 74% was included in this study and subjected to statistical analysis and procedures. As concepts and categories were developed based on the questionnaire results, the results were also involved in the application of grounded theory. The main findings presented in this dissertation consist of the development of a substantive theory for the adoption of biometric authentication for m-government applications in Saudi Arabia. These findings indicate that acceptance factors include relative advantage, compatibility, ease of use, trialability, observability, trust, and privacy, as well as contributory factors involving availability, awareness, legislation, economical aspects, and social and cultural aspects, which are the most important factors that will enable the KSA in achieving the adoption of biometric authentication in m-government security. The dissertation also identifies several needs, perceptions, and concerns of mobile phone users, service providers, network operators as well as system factors including requirements and procedural issues regarding the application of biometrics in m-government security. Furthermore, the analysis in this dissertation reveals a number of technical and non-technical challenges that would influence the adoption of biometrics in m-government. The identified technical challenges include infrastructure, growing a biometrics database, making mobile devices with biometric attachments available around the country, integrating biometrics along with a Public Key Infrastructure (PKI) in the smartcards of the mobile device, theft and penetrating possibility of biometric capture, and dealing with authentication errors in the system. The non-technical challenges include financial issues, registration and enrolment processes, lack of IT experts in the KSA, and lack of current relevant research. In this dissertation, a substantive theory is developed to explain the factors influencing the adoption of biometrics in m-government in Saudi Arabia. Therefore, the conclusions do not claim to be widely generalizable as the research is limited to a particular context and specific geographical area. However, future research in other geographical areas with different cultural backgrounds is recommended, as a number of substantive theories can help to create more general formal theory. This dissertation contributes to current knowledge by identifying and describing the factors that influence the adoption of biometric authentication in m-government Page ii

4 Abstract applications in the Saudi Arabian context. It improves understanding about the concerns and perceptions of mobile phone users, service providers, and network operators regarding the application of biometric authentication to mobile devices for government services. It further discovers the reasons why mobile communication users prefer the use of biometric authentication in their mobile devices to conduct government services. Moreover, it identifies the needs and requirements for service providers to adopt the use of biometrics for m-government services. In addition, this dissertation provides decision-makers with practical information regarding an appropriate authentication approach for the security of m-government services, as well as information on how biometric technology can be adopted for m-government applications. The practical contribution includes the design of an authentication system, based on the requirements of service providers and network providers, as appropriate for applying biometric technology in m-government security. Keywords M-government, biometric, authentication, adoption, qualitative study, grounded theory, Saudi Arabia. Page iii

5 Statement of Originality STATEMENT OF ORIGINALITY This work has not previously been submitted for a degree or diploma in any university. To the best of my knowledge and belief, the dissertation contains no material previously published or written by another person except where due reference is made in the thesis itself. Page iv

6 Acknowledgments ACKNOWLEDGEMENTS After sincerely thanking Allah for all blessings and for giving me the ability to fulfil this research, I would like to thank all the people who provided me with their assistance, support and guidance. First of all, I truly appreciate and wish to acknowledge my father and my mother for their enormous efforts and sacrifices to help, encourage, and support me. I would also like to express my deep gratitude to my wife and my son Omar. I am grateful to my wife for her kind encouragement and for marvellously providing the convenient atmosphere for me to complete my research. In addition, I would like to express my sincere gratitude and appreciation to my principal supervisor, Dr. Steve Drew, for his kind and valuable advice. His great help and positive support guided me immensely to accomplish my research. I would like to genuinely thank my Associate Supervisor, Associate Professor Liisa von Hellens, for her guidance, encouragement, and support along the way. I would also like to thank the Griffith School of Information and Communication Technology, in particular staff members and my PhD colleagues who provided me with useful knowledge throughout my academic journey. Finally, I would like to express my grateful thanks to my brothers and sisters and all my friends who supported me throughout this research, motivated me through their kind advice and encouraged me to pursue this degree. Page v

8 Table of Contents TABLE OF CONTENTS ABSTRACT... i STATEMENT OF ORIGINALITY... iv ACKNOWLEDGEMENTS...v PUBLICATIONS... vi TABLE OF CONTENTS... vii LIST OF FIGURES... xii LIST OF TABLES... xiii CHAPTER ONE: INTRODUCTION Introduction Research Aims and Questions Research Approach and Method Research Contributions Justification for and Significance of the Research Outline of the Dissertation...9 CHAPTER TWO: LITERATURE REVIEW Introduction Electronic and Mobile Government M-Government Applications M-Government Benefits M-Government Requirements M-Government Challenges Information Security and M-Government Information Assurance Authentication Strategies Security for Mobile Devices Security for Network Operators Security for Service Providers Security for Users The Current Authentication System in M-Government Biometrics as a Security Solution...26 Page vii

9 Table of Contents 2.4 Overview of Biometric Technology Biometric Systems Performance Measures Properties of Biometrics Application Areas of Biometrics Types of Biometric Technology Disadvantages of Biometric Technology Privacy Concerns about the Use of Biometric Technology Information and Communication Technology in the Kingdom of Saudi Arabia Information on National Planning in the KSA E-Government in the Kingdom of Saudi Arabia Government Electronic Transactions System (Yesser) M-Government Applications in the KSA Locating this Dissertation Users Service Providers Network Operators Conclusion...50 CHAPTER THREE: ADOPTION OF TECHNOLOGY Introduction Current Biometric Applications Biometrics in E-Government The Use of Biometrics in the KSA Factors Influencing Adoption of Technology Technology Acceptance Model Unified Theory of Acceptance and Use of Technology Diffusion of Innovation Adoption Factors among Empirical Studies Biometric Adoption among Empirical Studies Related Issues to the Adoption of Biometrics in M-Government Comparing Biometrics for Mobile Devices Biometrics in Mobile Devices Biometrics and M-Government...63 Page viii

11 Table of Contents 5.3 Distinguishing Survey Responses Based on Gender Exploring Relationships among Mobile Phone Users Perceptions Correlation between the Loss of Mobile Device and the Preferred Method of M-Government Authentication Correlation between the Risk of Disclosure of Personal Information and the Preferred Authentication Method of M-Government Correlation between the Risk of Disclosure of Personal Information and the Willingness to Pay more Money to have Biometrics in the Mobile Device Correlation between the Experience of Using Biometric Authentication and the Preferred Authentication Method of M-Government Correlation between the Importance of the Information Stored in a Mobile Device and the Preferred Authentication Method for a Mobile Device Correlation between the Importance of the Information Stored in a Mobile Device and the Consideration of Applying Biometrics to Protect the Information in a Mobile Device Correlation between the Trust in Biometrics and the Reasons for not Conducting any Government Service via a Mobile Device Conclusion CHAPTER SIX: GROUNDED THEORY DATA ANALYSIS Introduction Process and Procedure of Grounded Theory Open Coding Axial Coding Selective Coding Conclusion CHAPTER SEVEN: FACTORS INFLUENCING THE ADOPTION OF BIOMETRIC AUTHENTICATION IN M-GOVERNMENT Introduction Entities Factors Organisational Factors Users Factors System Factors Enabling Factors Acceptance Factors Contributory Factors Challenges Page x

14 List of Tables LIST OF TABLES Table 1: Summary of the most relevant literature on the research topic...68 Table 2: The links between research outcomes, techniques and questions...72 Table 3: Demographics...93 Table 4: ICT Experience...96 Table 5: Mobile Device and Government Services...99 Table 6: Mobile Device Security Table 7: Biometrics and Mobile Government Services Table 8: Correlation between the loss of a mobile device and the preferred method of m-government authentication Table 9: Correlation between the risk of disclosure of personal information and the preferred authentication method of m-government Table 10: Correlation between the risk of disclosure of personal information and the willingness to pay more money to have biometrics in the mobile device Table 11: Correlation between the experience of using biometric authentication and the preferred authentication method of m-government Table 12: Correlation between the importance of the information stored in a mobile device and the preferred authentication method for a mobile device Table 13: Correlation between the importance of the information stored in a mobile device and the opinion of applying biometrics to protect the information in a mobile device Table 14: Frequency for the trust in biometrics in m-government security and the reasons for not conducting any government service via a mobile device Table 15: Axial codes Page xiii

Knowledge Management Strategic Alignment in the Banking Sector at the Gulf Cooperation Council (GCC) Countries A thesis submitted in fulfillment of the requirement of the degree of DOCTOR OF PHILOSOPHY

Definitions, reuse and technology: How context impacts technology support for knowledge management. Vanessa Freke, B.InfoTech (Hons) Institute for Integrated and Intelligent Systems School of Information

Effect of Business Value Chain Practices on the Supply Chain Performance of Large Manufacturing Firms in Kenya TITLE Perris Wambui Chege A Research Proposal Submitted in Partial Fulfillment of Requirement

THESIS KAKITANGAN THE CASE FOR VALUE MANAGEMENT TO BE INCLUDED IN EVERY CONSTRUCTION PROJECT DESIGN PROCESS By FOTOSTAT TIDAK DIBEMARKAN AINIJAAPAR This dissertation is submitted in partial fulfillment

NATIONAL SURVEY OF THE PERCEPTIONS OF SELECTED SCHOOL BOARD MEMBERS REGARDING THE QUALITY AND CONDITION, MAINTENANCE, AND IMPROVEMENT AND RENOVATION OF EXISTING PUBLIC SCHOOL FACILITIES by James C. Moulton,

i THESIS STUDENTS ATTITUDES TOWARDS BUSINESS ETHICS: A COMPARISON BETWEEN INDONESIA AND LESOTHO. MPHOLLE CLEMENT PAE-PAE Student ID Number :125001758/PS/MM MASTER OF MANAGEMENT PROGRAM POSTGRADUATE PROGRAM

University of Wollongong Research Online University of Wollongong Thesis Collection University of Wollongong Thesis Collections 2007 Arab community and religious leaders' views about utilisation of mental

Experiential Education as a Best Practice Pedagogy for Environmental Education in Teacher Education Volume 1 Barry Law B.PE. M.Ed (Distinction) Dip Tchg Submitted in fulfilment of the requirements of the

CURRENCY COMPOSITION OF FOREIGN EXCHANGE RESERVES: A COMPARATIVE STUDY Department of Accounting, Finance and Economics Griffith Business School Submitted in fulfilment of the requirements of the degree

1. Standard Curriculum MFT Educational Guidelines 1.01 The program will document that all students have completed, or will complete while in the program, all coursework and clinical requirements of the

Planning your research Many students find that it helps to break their thesis into smaller tasks, and to plan when and how each task will be completed. Primary tasks of a thesis include - Selecting a research

IMPLEMENTATION OF SECURE MEDICAL RECORD USING SMARTCARD TECHNOLOGY JOTHI PRAKASH A/L MURUGAN DISSERTATION SUBMITTED IN FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF COMPUTER SCIENCE FACULTY

An Exploratory Investigation of the Sales Forecasting Process in the Casual Theme and Family Dining Segments of Commercial Restaurant Corporations Yvette Nicole Julia Green Dissertation submitted to the

University of Wollongong Research Online University of Wollongong Thesis Collection University of Wollongong Thesis Collections 2002 Managing synergetic momentum: a grounded theory of the management of

EXTERNAL CRITICAL SUCCESS FACTORS FOR THE GROWTH OF STARTUP SOFTWARE DEVELOPMENT COMPANIES IN SRI LANKA By J. C. Nanayakkara The dissertation was submitted to the Department of Computer Science and Engineering

Dr. Waleed A. Alrodhan (Biographical Sketch) Waleed was born in the Kingdom of Saudi Arabia in 1981. He has received his B.Sc. degree in Computer Sciences from King Saud University (2002), his M.Sc. degree

DESTINATION ATTRACTIVENESS AS A FUNCTION OF SUPPLY AND DEMAND INTERACTION by Sandro Formica Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment

COUPLE OUTCOMES IN STEPFAMILIES Vanessa Leigh Bruce B. Arts, B. Psy (Hons) This thesis is submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Clinical Psychology,

CHALLENGES AND THEIR RESOLUTIONS IN THE PROMOTION AND PROVISION OF ADULT LITERACY: A CASE OF LUFWANYAMA DISTRICT, COPPERBELT PROVINCE, ZAMBIA. BY EMMANUEL NDASHE A research dissertation submitted to the

ACKNOWLEDGEMENTS I wish to express a sincere thank you to the fifteen men and women who so graciously agreed to participate in my study. In the course of gathering this material, interviewing the participants,

SUCCESSION PLANNING AND MANAGEMENT PRACTICES AMONG PRIVATE SECTOR FIRMS IN MALAYSIA KRISHNA NAIDU S/O D. SUPPIAH GRADUATE SCHOOL OF BUSINESS FACULTY OF BUSINESS AND ACCOUNTANCY UNIVERSITY OF MALAYA JUNE

Copyright is owned by the Author of the thesis Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only The thesis may not be reproduced elsewhere

UNIVERSITY OF MACAU DEPARRMENT OF COMMUNICATION A comparative study on the perceived responsibility of Internet Speech between university students in Macao and US By CHAN IN SAN, REBECCA Student ID : M-A8-5553-6

THESIS THE TEACHER S ROLES IN TEACHING ENGLISH FOR SPECIFIC PURPOSES TO NURSING PROGRAM STUDENTS NURUL ARIFAH 821272016 Graduate School of English Education Department Widya Mandala Catholic University

The DBA at Henley We attract experienced and motivated individuals to undertake significant research that shapes organisational thinking and provides an increasingly complex business environment. We are

Name Diploma Supervisor Title Regan a/l Rajan Business Administration specializing in Marketing Mr. Karuna The study of Public relations and customer satisfaction in the wireless telecommunication industry

THE EXPERIENCES OF BLACK STUDENTS WHO DROPPED OUT OF THE MASTERS IN EDUCATIONAL PSYCHOLOGY COURSE AT A GAUTENG UNIVERSITY DURING THE PERIOD 2002 TO 2006 By LYNN COURT HOLMES MINI DISSERTATION Submitted

National Chiayi University Department of Education, Coursework Guidelines for Master s and Doctoral Students 1. Classes The graduate institute of this department offers master s degree and doctoral degree

THE ROLE OF COMPUTER AND INTERNET ACCESS IN BUSINESS STUDENTS ACCEPTANCE OF E-LEARNING TECHNOLOGY By Ronda Henderson Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State

AN INVESTIGATION INTO THE FORMATIVE ASSESSMENT PRACTICES OF TEACHERS IN SELECTED FORT BEAUFORT SCHOOLS. A CASE STUDY IN THE EASTERN CAPE. By MONGEZI WILLIAM KUZE IN FULFILLMENT OF THE REQUIREMENT FOR THE

FACTORS THAT INFLUENCE JOB TURNOVER OF SOCIAL WORKERS IN THE DIRECTORATE OF DEVELOPMENTAL SOCIAL WELFARE SERVICES (DDSWS) IN NAMIBIA BY CECILIA MATHE MABENGANO SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS

IT-ENABLED SUPPLY CHAIN MANAGEMENT: STUDIES IN SELECT INDIAN INDUSTRIES By SANJAY JHARKHARIA Department of Management Studies Submitted in fulfillment of the requirement of the degree of DOCTOR OF PHILOSOPHY

Acknowledgement Thanks to God, who helped me achieving this work Without the encouragement and support of many people the progress on this thesis would have been severely impeded. I would like to extend

INTERNET-BASED COLLABORATIVE PROGRAMMING TECHNIQUES AND ENVIRONMENTS By Haifeng Shen A DISSERTATION SUBMITTED IN FULFILLMENT OF THE REQUIREMENTS OF THE DEGREE OF DOCTOR OF PHILOSOPHY AT THE SCHOOL OF COMPUTING

UNDERSTANDING THE WORK EXPERIENCES, COPING STRATEGIES AND ORGANISATIONAL RETENTION OF SOCIAL WORKERS IN GAUTENG IN-PATIENT SUBSTANCE ABUSE TREATMENT CLINICS Alexandrina Vermeulen A research report submitted

Framework, Approach and System of Intelligent Fault Tree Analysis for Nuclear Safety Assessment A Thesis Submitted for the Degree of Doctor of Philosophy By Julwan Hendry PURBA University of Technology,

TIME-MANAGEMENT PRACTICES OF SCHOOL PRINCIPALS IN THE UNITED STATES by Peggie Johnson Robertson Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial

Mobile Claims Management IT-Based Innovation in Motor Insurance DISSERTATION of the University of St.Gallen Graduate School of Business Administration, Economics, Law and Social Sciences (HSG) to obtain

University of Wollongong Research Online University of Wollongong Thesis Collection University of Wollongong Thesis Collections 2008 Organisational change and accounting information systems: a case study

A Study of the Factors that Influence the Acceptance of e-commerce in Developing Countries: A Comparative Survey between Iran and United Arab Emirates Lotfollah Forouzandeh Dehkordi Assistant Professor

Performance Evaluation of the Process Industry Supply r Chain: Case of the Petroleum Industry in India :.2A By Siddharth Varma Submitted in fulfillment of requirements of the degree of DOCTOR OF PHILOSOPHY

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere

Doctoral Degree Programs in Higher Education The Program in Higher Education offers the Ed.D. and Ph.D. in Higher Education. Both programs are designed to enable students to: acquire knowledge about and

Analysis and Design of Active Queue Management for TCP-RED Congestion Control Strategies By Nabhan Hamadneh A thesis submitted for the degree of Doctor of Philosophy School of Information Technology, Murdoch

DIMENSIONS OF SERVICE QUALITY AND SERVICE CLIMATE: A STUDY OF BANK CUSTOMERS AND EMPLOYEES IN FOUR LOCAL MALAYSIAN BANKS A thesis submitted for the degree of Doctor of Philosophy at the University of Stirling

A CASE STUDY ON SECONDARY SCHOOL STUDENTS RELUCTANCE IN SEEKING COUNSELLING by Mohd Aizat Omar Mohd Shukri Hussin Izzah Farhani Md Khalid ABSTRACT The purpose of this study was to investigate secondary

Changing Power Balance in Matrix Organizations A thesis submitted by Nursen Saracoglu In partial fulfillment of the requirements for the degree of Doctor of Philosophy Faculty of Business The University

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere

This thesis is submitted for the Degree of Doctor of Philosophy University of Canberra TOWARD PUBLIC MANAGEMENT BY ENHANCING PUBLIC SECTOR STRATEGIC PLANNING Using Private Sector Planning Techniques to

EXPERT SYSTEM FOR RESOLUTION OF DELAY CLAIMS IN CONSTRUCTION CONTRACTS by NITIN BALKRISHNA CHAPHALKAR Department of Civil Engineering Submitted in fulfillment of the requirements of the degree of Doctor

CHAPTER 3 RESEARCH METHODOLOGY 3.1 Introduction When conducting research, there are many possible ways of gathering information from participants. In this chapter, the research methodology for the collecting

EFFECTIVE STRATEGIES OF MANAGING GENERATION Y TEACHERS IN PUBLIC SECONDARY SCHOOLS IN KENYA: THE CASE OF KHWISERO SUB-COUNTY WANYAMA ENOCK SIFUNA A DISSERTATION SUBMITTED TO THE BUSINESS SCHOOL IN PARTIAL

TEACHER PREPAREDNESS TO UTILIZE EMERGENT LITERACY FOR TEACHING INITIAL LITERACY IN SELECTED SCHOOLS OF MANSA DISTRICT BY SAMUEL IMANGE A Dissertation Submitted to the University of Zambia in Partial Fulfilment

To ensure the functioning of the site, we use cookies. We share information about your activities on the site with our partners and Google partners: social networks and companies engaged in advertising and web analytics. For more information, see the Privacy Policy and Google Privacy &amp Terms.
Your consent to our cookies if you continue to use this website.